IOC Report
jXtV6KO1A7.exe

loading gif

Files

File Path
Type
Category
Malicious
jXtV6KO1A7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\Common Files\System\ado\en-US\Registry.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Pictures\hYMmOtYRdhDhf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\hoedt554\hoedt554.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\AUxWHHiO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AZuFUlyQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BifwrcrL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DSJnFhkO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ESXfsmJN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FPynOmYI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FUwWbQoJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GSXexQDE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IFbmiezC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LAruMjCr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LIbMrSdw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OCediSHm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PqilTgDk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PvfTgKTl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PySDyPdp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QjjbSXPj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UZaSZUPd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UrhkoqJf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UvHCLyMa.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WcMBvDTY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WxtkghQV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bXOSCjJR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bsvBnNGP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cXcKpojQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eDwAwSEJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fNEJJgKL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fcnjtBSI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gXpAgXCG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iQFjSUoF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jBWHmcZz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jFwZJlcu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lyyPHcot.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mHjHeUgp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nrNytZZs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ptzhOIen.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pwmQgNor.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rqbpkIti.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sQKOYFFi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sefxVWpg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\taSXmSLk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ugRfrFtb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\upByWoUh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\utbPtwXc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wetnNFIW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zXVOlHTT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zxAgkPgS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Logs\CBS\hYMmOtYRdhDhf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Common Files\System\ado\en-US\Registry.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\System\ado\en-US\ee2ad38f3d4382
ASCII text, with very long lines (932), with no line terminators
dropped
C:\Program Files\Windows Media Player\Media Renderer\9e8d7a4ca61bd9
ASCII text, with very long lines (760), with no line terminators
dropped
C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Documents\23fc0d88861170
ASCII text, with very long lines (769), with no line terminators
dropped
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Pictures\23fc0d88861170
ASCII text, with very long lines (334), with no line terminators
dropped
C:\Users\Public\Pictures\hYMmOtYRdhDhf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\hYMmOtYRdhDhf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\jXtV6KO1A7.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\2CPXfojCPJ
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RESAFD2.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6ec, 10 symbols, created Sat Apr 20 04:37:10 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0bekgdi1.4lq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0v53vaap.wh2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1blvv4yb.jeo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1cqfkyaa.4b3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2tarwi1u.wti.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_33knc5ss.j1z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3gzqcoav.tqm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3vj1yr3y.ok0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3zyhtfhq.npo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4h05pjmz.zwg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4hql5z42.zec.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4salabig.cei.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qpqdrg4.zwn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1abstws.hbt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ael1pako.vp2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ak2xlw32.uv3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ax5qrwna.jng.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcbpwps1.4ja.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bzgqb0sk.nca.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cikbztlq.k2l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ciobwaxa.ibs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clkupt02.ua4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmwmb2zc.pnm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dawabxlt.ygr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dc43jbxc.uzs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dlug2blw.d40.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_emzyfzde.4iq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ezrjbmix.nus.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3owzepf.cxi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gnjt5imw.esm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gpm4ezsn.1ad.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsarkdgu.kmb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gvzppiqa.kr2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h15yqcdg.sqr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i2bkh1ot.ima.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inn0f1zi.0yi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iwebwwdy.hm5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j33evzrr.okc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3bpil1f.y4z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfe4cegu.kzv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jk4cbuh3.t2o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbmpnnyi.wdm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_levljmze.z31.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mcmlnl45.skz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlkvl0xj.v35.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ofixf0w5.4at.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pkgqrmhs.u40.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pkkwjehs.kur.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pluyswh3.mqy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_po1ns30w.jtt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwnsnjce.5ul.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qfzwp4y2.ibs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qhyj45p2.puq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rg5cgvks.mex.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sj4iarsk.vsw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sug20ehi.3qi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_swqzo3gn.cgq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t102uywa.nl4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4dnavjd.mb5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_thz2lbeh.yre.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tikz3kvj.rs1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tt0jhncp.vwz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_txyhgyyv.d1p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_udautaxk.2hi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uijbarrw.kua.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wf2kzfdc.gy4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wll1kl1o.kl3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wqefpren.4cz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbwmhl4r.uru.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmbiupug.x0i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z4gap0gf.vck.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhfsmmkm.efq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dlRCjeHhst.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hoedt554\hoedt554.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\hoedt554\hoedt554.out
Unicode text, UTF-8 (with BOM) text, with very long lines (329), with CRLF, CR line terminators
modified
C:\Users\user\Desktop\4f893074fe26e1
ASCII text, with very long lines (852), with no line terminators
dropped
C:\Windows\Logs\CBS\23fc0d88861170
ASCII text, with very long lines (325), with no line terminators
dropped
C:\Windows\Logs\CBS\hYMmOtYRdhDhf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\CSCDDA5522436C442998F7B48C7E6412627.TMP
MSVC .res
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 139 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jXtV6KO1A7.exe
"C:\Users\user\Desktop\jXtV6KO1A7.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hoedt554\hoedt554.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
malicious
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
malicious
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Logs\CBS\hYMmOtYRdhDhf.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Documents\My Pictures\hYMmOtYRdhDhf.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\System\ado\en-US\Registry.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\hYMmOtYRdhDhf.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\jXtV6KO1A7.exe'
malicious
C:\Users\user\Desktop\jXtV6KO1A7.exe
C:\Users\user\Desktop\jXtV6KO1A7.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\dlRCjeHhst.bat"
malicious
C:\Users\user\Desktop\jXtV6KO1A7.exe
C:\Users\user\Desktop\jXtV6KO1A7.exe
malicious
C:\Program Files\Common Files\System\ado\en-US\Registry.exe
"C:\Program Files\Common Files\System\ado\en-US\Registry.exe"
malicious
C:\Program Files\Common Files\System\ado\en-US\Registry.exe
"C:\Program Files\Common Files\System\ado\en-US\Registry.exe"
malicious
C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe
"C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe"
malicious
C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe
"C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
"C:\Users\Public\Documents\hYMmOtYRdhDhf.exe"
malicious
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
"C:\Users\Public\Documents\hYMmOtYRdhDhf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Users\Public\Documents\hYMmOtYRdhDhf.exe"
malicious
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
C:\Users\Public\Documents\hYMmOtYRdhDhf.exe
malicious
C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe
"C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESAFD2.tmp" "c:\Windows\System32\CSCDDA5522436C442998F7B48C7E6412627.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 49 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/wsdl/
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hYMmOtYRdhDhf
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hYMmOtYRdhDhf
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Registry
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
jXtV6KO1A7
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
jXtV6KO1A7
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hYMmOtYRdhDhf
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hYMmOtYRdhDhf
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hYMmOtYRdhDhf
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hYMmOtYRdhDhf
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\5980bc79849998ef92600d748429cc87266fa06e
bb3dd1e3fae7d28be46a538fd69028f725d9b30c
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F82000
unkown
page readonly
malicious
1524F9000
stack
page read and write
1B7F0000
heap
page read and write
1413000
heap
page read and write
C4E73FE000
stack
page read and write
191D000
heap
page read and write
1310000
heap
page read and write
26458554000
heap
page read and write
DE618FE000
stack
page read and write
830EDFB000
stack
page read and write
19CAE7E000
stack
page read and write
13E0E000
trusted library allocation
page read and write
147E000
heap
page read and write
26458750000
direct allocation
page read and write
144D6EE0000
heap
page read and write
2432E735000
heap
page read and write
2CA9000
trusted library allocation
page read and write
13EC0000
trusted library allocation
page read and write
74899CE000
stack
page read and write
2A60000
heap
page read and write
AC9348E000
stack
page read and write
4A5A879000
stack
page read and write
3EBD000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
3EDB000
trusted library allocation
page read and write
C4E6BAF000
unkown
page read and write
6836F78000
stack
page read and write
FD8000
heap
page read and write
13C98000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
20A58620000
heap
page read and write
10B5000
heap
page read and write
13A45000
trusted library allocation
page read and write
4A5A5FE000
stack
page read and write
DE61EBC000
stack
page read and write
3EC9000
trusted library allocation
page read and write
2200260D000
heap
page read and write
FA0000
heap
page read and write
6BE310E000
stack
page read and write
1BA4F000
heap
page read and write
13A5B000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
8DEEC38000
stack
page read and write
134F2000
trusted library allocation
page read and write
28D0339000
stack
page read and write
20A58705000
heap
page read and write
22661A92000
heap
page read and write
1B84F000
stack
page read and write
209241E0000
heap
page read and write
1038000
heap
page read and write
2432E8C0000
trusted library section
page read and write
16FE000
stack
page read and write
22A39D4B000
heap
page read and write
1CCE000
stack
page read and write
18D0000
heap
page read and write
13D6C000
trusted library allocation
page read and write
6BE2439000
stack
page read and write
201C0BA0000
heap
page read and write
14278000
trusted library allocation
page read and write
15257E000
stack
page read and write
263FC7E000
stack
page read and write
206E08C1000
heap
page read and write
2092430C000
heap
page read and write
3522000
unkown
page readonly
830EAF9000
stack
page read and write
22CDEC35000
heap
page read and write
7FFD9B788000
trusted library allocation
page read and write
22401C40000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
22A39D5D000
heap
page read and write
AA5A73C000
stack
page read and write
1D180001000
trusted library allocation
page read and write
1D22000
unkown
page readonly
1304E8C0000
trusted library allocation
page read and write
14C64C90000
trusted library allocation
page read and write
1BCE000
stack
page read and write
22CE06F5000
heap
page read and write
2200261B000
heap
page read and write
201C0BB8000
heap
page read and write
1CB5B4D0000
heap
page read and write
1ABD1E59000
heap
page read and write
100A000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
13B35000
trusted library allocation
page read and write
E34000
heap
page read and write
2DDA000
trusted library allocation
page read and write
28D017D000
stack
page read and write
1BA44000
heap
page read and write
1AAD6263000
heap
page read and write
209262D0000
trusted library allocation
page read and write
C4E6B23000
stack
page read and write
B605BCE000
stack
page read and write
144B9000
trusted library allocation
page read and write
1CB5CCF0000
trusted library allocation
page read and write
206E0A20000
heap
page read and write
26458554000
heap
page read and write
18F1000
heap
page read and write
3533000
heap
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
2D9F000
stack
page read and write
13F5D000
trusted library allocation
page read and write
22CDEBD0000
heap
page read and write
2B200BBF000
trusted library allocation
page read and write
1400F000
trusted library allocation
page read and write
CE2000
stack
page read and write
DC0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
AA5A3FE000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
28D063B000
stack
page read and write
13CE5000
trusted library allocation
page read and write
216B2F35000
heap
page read and write
14F6000
heap
page read and write
B604BFE000
stack
page read and write
2645AF60000
direct allocation
page read and write
26406CE000
stack
page read and write
4A5AA7E000
stack
page read and write
143D000
heap
page read and write
15217F000
unkown
page read and write
B604D78000
stack
page read and write
7FFD9B764000
trusted library allocation
page read and write
AA5A37A000
stack
page read and write
4A5B64E000
stack
page read and write
13F07000
trusted library allocation
page read and write
5BF2EFD000
stack
page read and write
6836A7E000
unkown
page read and write
264586BB000
direct allocation
page read and write
1CB5B2C8000
heap
page read and write
1810000
trusted library allocation
page read and write
6BE1E73000
stack
page read and write
1260000
trusted library allocation
page read and write
E2D000
heap
page read and write
141B4000
trusted library allocation
page read and write
14C651B0000
heap
page execute and read and write
DE61B79000
stack
page read and write
DE62B8C000
stack
page read and write
3C17000
trusted library allocation
page read and write
1502000
heap
page read and write
20925B60000
heap
page readonly
75FE70C000
stack
page read and write
4A5A97B000
stack
page read and write
1D32000
unkown
page readonly
22A3BAE3000
heap
page read and write
26458568000
heap
page read and write
20A5871D000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
1BA56000
heap
page read and write
2645AEDF000
direct allocation
page read and write
7488F7C000
stack
page read and write
6837C4E000
stack
page read and write
6BE23B8000
stack
page read and write
1313000
heap
page read and write
22401D80000
heap
page read and write
1330000
heap
page read and write
1AAD7E70000
trusted library allocation
page read and write
264584FD000
heap
page read and write
28D1089000
stack
page read and write
12D80000
trusted library allocation
page read and write
2EE2000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
226638F0000
heap
page read and write
263F30F000
unkown
page read and write
206E08B1000
heap
page read and write
22661BE0000
heap
page read and write
28CFBF3000
stack
page read and write
13B5A000
trusted library allocation
page read and write
1AAD7EA0000
trusted library allocation
page read and write
1ABD01F0000
trusted library allocation
page read and write
2645856E000
heap
page read and write
20925C55000
heap
page read and write
1ABD2277000
trusted library allocation
page read and write
209242F6000
heap
page read and write
8DEE55F000
unkown
page read and write
1ABD01B0000
heap
page read and write
263F6F9000
stack
page read and write
20926335000
trusted library allocation
page read and write
31F0000
heap
page execute and read and write
1BEFE000
stack
page read and write
139E9000
trusted library allocation
page read and write
7FFD9B778000
trusted library allocation
page read and write
AA5B54C000
stack
page read and write
1240000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
216B2D80000
heap
page read and write
3F61000
trusted library allocation
page read and write
1AAD6300000
heap
page read and write
1304EE30000
trusted library allocation
page read and write
1BDFE000
stack
page read and write
3C41000
trusted library allocation
page read and write
191F000
stack
page read and write
22CDEBC0000
heap
page read and write
15350E000
stack
page read and write
20926345000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
20925B70000
trusted library allocation
page read and write
20925BE0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
FC6000
unkown
page readonly
31C0000
heap
page read and write
22CDEC80000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
C4E72FE000
stack
page read and write
20A5A0C0000
trusted library allocation
page read and write
75FE58D000
stack
page read and write
6BE22BE000
stack
page read and write
22CDECCB000
heap
page read and write
1ABD0120000
heap
page read and write
14C63490000
heap
page read and write
5BF2F79000
stack
page read and write
16DE000
stack
page read and write
22A39D41000
heap
page read and write
1943000
heap
page read and write
5BF323E000
stack
page read and write
3F07000
trusted library allocation
page read and write
1304CEA3000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
1475000
heap
page read and write
22663AE1000
trusted library allocation
page read and write
26458780000
heap
page read and write
7488DFF000
stack
page read and write
2EE6000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
216B3030000
heap
page readonly
243300C0000
heap
page readonly
1ABD209E000
trusted library allocation
page read and write
8DEEDBE000
stack
page read and write
2645854F000
heap
page read and write
DE61E3A000
stack
page read and write
13D8E000
trusted library allocation
page read and write
1AAD6200000
heap
page read and write
7488E7C000
stack
page read and write
1304CE68000
heap
page read and write
B604E7B000
stack
page read and write
167C000
heap
page read and write
6836E77000
stack
page read and write
1ABD0255000
heap
page read and write
22A39D3F000
heap
page read and write
14198000
trusted library allocation
page read and write
264584D9000
heap
page read and write
220026D0000
heap
page execute and read and write
19CB23F000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
264586A7000
direct allocation
page read and write
28CFFF9000
stack
page read and write
140A6000
trusted library allocation
page read and write
AC9263E000
stack
page read and write
216B3000000
trusted library allocation
page read and write
1AAD7E60000
heap
page readonly
19CBE0E000
stack
page read and write
100C000
heap
page read and write
18F4000
heap
page read and write
13371000
trusted library allocation
page read and write
22661A2D000
heap
page read and write
220042C4000
heap
page read and write
14C63338000
heap
page read and write
2432E670000
heap
page read and write
6BE1F7F000
stack
page read and write
1658000
heap
page read and write
20926368000
trusted library allocation
page read and write
22663D06000
trusted library allocation
page read and write
3EE5000
trusted library allocation
page read and write
4A5B84C000
stack
page read and write
20924270000
heap
page read and write
1422000
heap
page read and write
8DEEA7D000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
E75000
heap
page read and write
2645AEE0000
direct allocation
page read and write
1CB5D321000
trusted library allocation
page read and write
C4E74BE000
stack
page read and write
5BF2C7F000
stack
page read and write
201C355D000
trusted library allocation
page read and write
20A58723000
heap
page read and write
E3D000
heap
page read and write
6836FFF000
stack
page read and write
201C2460000
heap
page execute and read and write
1CB5D2B0000
heap
page execute and read and write
2645856E000
heap
page read and write
26458520000
heap
page read and write
1AC5000
heap
page read and write
14DE000
heap
page read and write
7FFD9B964000
trusted library allocation
page read and write
14C63330000
heap
page read and write
1ABD0160000
trusted library allocation
page read and write
7FF489A50000
trusted library allocation
page execute and read and write
263F87E000
stack
page read and write
11D0000
heap
page read and write
6837CC7000
stack
page read and write
6E2000
stack
page read and write
AC92379000
stack
page read and write
22661A97000
heap
page read and write
1304EE10000
heap
page execute and read and write
7FFD9B8B3000
trusted library allocation
page execute and read and write
13EBE000
trusted library allocation
page read and write
75FE78E000
stack
page read and write
15293E000
stack
page read and write
68367EE000
stack
page read and write
1CB5B2A0000
heap
page read and write
22A39DD0000
heap
page read and write
20925C50000
heap
page read and write
6BE24BE000
stack
page read and write
20A58729000
heap
page read and write
2C1E000
stack
page read and write
5BF3E8D000
stack
page read and write
1620000
heap
page read and write
1CB5B4C5000
heap
page read and write
DE61F3E000
stack
page read and write
3530000
heap
page execute and read and write
75FD7B6000
stack
page read and write
17F0000
trusted library allocation
page read and write
13FA4000
trusted library allocation
page read and write
1408000
heap
page read and write
226638D0000
heap
page execute and read and write
8DEEAF9000
stack
page read and write
22A3BEE5000
trusted library allocation
page read and write
226619D0000
heap
page read and write
15267D000
stack
page read and write
3F45000
trusted library allocation
page read and write
1AAD626B000
heap
page read and write
6BE207A000
stack
page read and write
8DEED3E000
stack
page read and write
220026F0000
trusted library allocation
page read and write
13978000
trusted library allocation
page read and write
4A5B7CD000
stack
page read and write
AC93307000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
263FB7E000
stack
page read and write
4A5ABFF000
stack
page read and write
BC0000
heap
page read and write
13C0000
trusted library allocation
page read and write
24330090000
trusted library allocation
page read and write
14C6338D000
heap
page read and write
2645AF20000
direct allocation
page read and write
7FFD9B993000
trusted library allocation
page read and write
C4E814C000
stack
page read and write
E50000
heap
page read and write
2645855A000
heap
page read and write
13D48000
trusted library allocation
page read and write
1CB5B2C0000
heap
page read and write
5BF3D8E000
stack
page read and write
15370E000
stack
page read and write
33A212C000
stack
page read and write
14D4000
heap
page read and write
226619F5000
heap
page read and write
2645AF00000
direct allocation
page read and write
3520000
unkown
page readonly
4A5B6CE000
stack
page read and write
22663770000
heap
page readonly
22A39D08000
heap
page read and write
243308B6000
trusted library allocation
page read and write
13E32000
trusted library allocation
page read and write
13B96000
trusted library allocation
page read and write
E00000
heap
page read and write
1304E8B0000
heap
page execute and read and write
8DEEF3B000
stack
page read and write
14136000
trusted library allocation
page read and write
1CB5D2E7000
heap
page execute and read and write
3E73000
trusted library allocation
page read and write
139E5000
trusted library allocation
page read and write
75FD93E000
stack
page read and write
1AC30000
trusted library allocation
page read and write
13FD6000
trusted library allocation
page read and write
8DEE97F000
stack
page read and write
1451000
heap
page read and write
1404F000
trusted library allocation
page read and write
1B602000
heap
page read and write
13D11000
trusted library allocation
page read and write
13CC8000
trusted library allocation
page read and write
E0688FF000
stack
page read and write
19CBF8C000
stack
page read and write
2645AF45000
direct allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
1304CEE8000
heap
page read and write
AA5B5CE000
stack
page read and write
20A5A858000
trusted library allocation
page read and write
13EC5000
trusted library allocation
page read and write
C4E70FD000
stack
page read and write
E7C000
heap
page read and write
144D6CE0000
heap
page read and write
75FD47E000
stack
page read and write
1230000
heap
page read and write
144D6DC0000
heap
page read and write
1302000
heap
page read and write
2432E6F3000
heap
page read and write
B6047DE000
stack
page read and write
1ABCFFE0000
heap
page read and write
1304CE10000
heap
page read and write
1AAD7F10000
heap
page read and write
2C90000
heap
page execute and read and write
1CB5B3B8000
heap
page read and write
13EF6000
trusted library allocation
page read and write
152B3B000
stack
page read and write
3371000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
22CDECAD000
heap
page read and write
1ABD0250000
heap
page read and write
2B10000
heap
page read and write
20A5A8C5000
trusted library allocation
page read and write
22CE0620000
heap
page readonly
11880001000
trusted library allocation
page read and write
4A5B747000
stack
page read and write
22002795000
heap
page read and write
12DA1000
trusted library allocation
page read and write
1675000
heap
page read and write
26458689000
direct allocation
page read and write
4A5A4FF000
unkown
page read and write
DE61BBE000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
22A3BD45000
trusted library allocation
page read and write
3F39000
trusted library allocation
page read and write
209261B7000
heap
page execute and read and write
13464000
trusted library allocation
page read and write
12C11000
trusted library allocation
page read and write
DE61D3E000
stack
page read and write
AC9273E000
stack
page read and write
7488BF7000
stack
page read and write
68370FC000
stack
page read and write
8DEE4D3000
stack
page read and write
1ABD21C1000
trusted library allocation
page read and write
3560000
unkown
page readonly
14C63460000
heap
page read and write
2A69000
heap
page read and write
26458525000
heap
page read and write
3F1D000
trusted library allocation
page read and write
14F9000
heap
page read and write
BC0000
heap
page read and write
201C2810000
trusted library allocation
page read and write
3267000
heap
page read and write
3F2F000
trusted library allocation
page read and write
139A9000
trusted library allocation
page read and write
DE62C0E000
stack
page read and write
220026E0000
heap
page readonly
263FA79000
stack
page read and write
1980000
heap
page read and write
16B4000
heap
page read and write
1D50000
unkown
page readonly
14118000
trusted library allocation
page read and write
1ABD0084000
heap
page read and write
1CB5B3B6000
heap
page read and write
D40000
heap
page read and write
24330715000
trusted library allocation
page read and write
8DEFB0C000
stack
page read and write
220025C0000
trusted library allocation
page read and write
6BE253F000
stack
page read and write
5BF333E000
stack
page read and write
2F86000
trusted library allocation
page read and write
3F05000
trusted library allocation
page read and write
216B2E60000
heap
page read and write
1ABD0008000
heap
page read and write
22CDED12000
heap
page read and write
8DEFA07000
stack
page read and write
1AAD6220000
heap
page read and write
13C90000
trusted library allocation
page read and write
2A67000
heap
page read and write
1304E9B5000
heap
page read and write
19CBF07000
stack
page read and write
12CA7000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page read and write
22002420000
heap
page read and write
14055000
trusted library allocation
page read and write
22661A54000
heap
page read and write
10A5000
heap
page read and write
13D28000
trusted library allocation
page read and write
144C7000
trusted library allocation
page read and write
13F43000
trusted library allocation
page read and write
216B2F2D000
heap
page read and write
1AAD60B0000
heap
page read and write
14C63429000
heap
page read and write
7488D7E000
stack
page read and write
75FE607000
stack
page read and write
22CDECD1000
heap
page read and write
20924338000
heap
page read and write
DE615CF000
unkown
page read and write
1CE0000
unkown
page readonly
1D00000
unkown
page readonly
1ABD005D000
heap
page read and write
2432E70D000
heap
page read and write
20924200000
heap
page read and write
22004460000
heap
page read and write
11880084000
trusted library allocation
page read and write
22E80225000
trusted library allocation
page read and write
20A58766000
heap
page read and write
26458730000
direct allocation
page read and write
7FFD9B99D000
trusted library allocation
page read and write
22004471000
trusted library allocation
page read and write
1ABD01B5000
heap
page read and write
1D30000
unkown
page readonly
141ED000
trusted library allocation
page read and write
B604EFA000
stack
page read and write
13744000
trusted library allocation
page read and write
13B2F000
trusted library allocation
page read and write
2B200225000
trusted library allocation
page read and write
35E0000
unkown
page readonly
41729BE000
stack
page read and write
7489B4D000
stack
page read and write
2ECC000
trusted library allocation
page read and write
1429A000
trusted library allocation
page read and write
14C65240000
heap
page execute and read and write
1CB5B2FE000
heap
page read and write
AA5A8BC000
stack
page read and write
13B3B000
trusted library allocation
page read and write
3F27000
trusted library allocation
page read and write
1AAD83FA000
trusted library allocation
page read and write
18B6000
heap
page read and write
2B200D6A000
trusted library allocation
page read and write
13B02000
trusted library allocation
page read and write
209262B1000
trusted library allocation
page read and write
75FD73E000
stack
page read and write
206E08C1000
heap
page read and write
24330680000
heap
page execute and read and write
220027D5000
heap
page read and write
12CA1000
trusted library allocation
page read and write
1499000
heap
page read and write
140FB000
trusted library allocation
page read and write
13E04000
trusted library allocation
page read and write
143F000
heap
page read and write
830EA77000
stack
page read and write
1CB5CD10000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
2A60000
heap
page read and write
1ABD00E5000
heap
page read and write
22A3BAC0000
trusted library allocation
page read and write
220027D0000
heap
page read and write
22CE06A0000
trusted library allocation
page read and write
1ABCFEE0000
heap
page read and write
3269000
heap
page read and write
1CB5B34A000
heap
page read and write
2DA9000
trusted library allocation
page read and write
8DEF90E000
stack
page read and write
12DA7000
trusted library allocation
page read and write
3540000
unkown
page readonly
3EB3000
trusted library allocation
page read and write
264583F0000
heap
page read and write
22CE0BB1000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
10C6000
heap
page read and write
279FFD60000
heap
page read and write
216B2EF8000
heap
page read and write
226638A0000
heap
page execute and read and write
209261F0000
trusted library allocation
page read and write
3E4B000
trusted library allocation
page read and write
AC92436000
stack
page read and write
1D70000
heap
page read and write
EED000
heap
page read and write
142FB000
trusted library allocation
page read and write
8DEE9FB000
stack
page read and write
13F5F000
trusted library allocation
page read and write
22CDECD5000
heap
page read and write
13FF3000
trusted library allocation
page read and write
1B4BF000
stack
page read and write
4A5A473000
stack
page read and write
20924260000
trusted library section
page read and write
C4E6FFE000
stack
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
2432E6ED000
heap
page read and write
7FFD9B96D000
trusted library allocation
page read and write
1BA00000
heap
page read and write
3F47000
trusted library allocation
page read and write
6836D7E000
stack
page read and write
1AAD80C1000
trusted library allocation
page read and write
8DEFA89000
stack
page read and write
22CDEC30000
heap
page read and write
20A5A195000
heap
page read and write
216B3040000
trusted library allocation
page read and write
153607000
stack
page read and write
2E21000
trusted library allocation
page read and write
201C2840000
trusted library allocation
page read and write
BD0000
heap
page read and write
1304EE40000
heap
page execute and read and write
14243000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
20925B50000
trusted library allocation
page read and write
14265000
trusted library allocation
page read and write
216B3020000
trusted library allocation
page read and write
6BE1FFE000
stack
page read and write
12C01000
trusted library allocation
page read and write
8DEEE3D000
stack
page read and write
3562000
unkown
page readonly
1304CEBD000
heap
page read and write
830EB7A000
stack
page read and write
AA5A27F000
stack
page read and write
B604B79000
stack
page read and write
13EF0000
trusted library allocation
page read and write
13C80000
trusted library allocation
page read and write
14305000
trusted library allocation
page read and write
6BE21FE000
stack
page read and write
830E97D000
stack
page read and write
22002619000
heap
page read and write
AC9338C000
stack
page read and write
3C0D000
trusted library allocation
page read and write
206E0880000
heap
page read and write
372E000
stack
page read and write
216B2F79000
heap
page read and write
142F5000
trusted library allocation
page read and write
216B4CA0000
heap
page read and write
2CA1000
trusted library allocation
page read and write
264585F0000
heap
page read and write
DE0000
heap
page read and write
6BE2177000
stack
page read and write
8DEF98E000
stack
page read and write
14386000
trusted library allocation
page read and write
5BF2D79000
stack
page read and write
263F977000
stack
page read and write
5BF313A000
stack
page read and write
AC91D43000
stack
page read and write
8DEEB3E000
stack
page read and write
24330577000
heap
page read and write
13CFF000
trusted library allocation
page read and write
13B37000
trusted library allocation
page read and write
1306000
unkown
page readonly
AA5A2FE000
stack
page read and write
19CAEF9000
stack
page read and write
2432E738000
heap
page read and write
3868000
trusted library allocation
page read and write
1D75000
heap
page read and write
143AC000
trusted library allocation
page read and write
22A39CF0000
trusted library section
page read and write
1CB5CD60000
trusted library allocation
page read and write
216B2F3B000
heap
page read and write
75FDABE000
stack
page read and write
748887F000
stack
page read and write
15358E000
stack
page read and write
8DEE87F000
stack
page read and write
13DB1000
trusted library allocation
page read and write
201C2970000
heap
page execute and read and write
13F5000
heap
page read and write
4172879000
stack
page read and write
1CB5D300000
trusted library allocation
page read and write
1AAD627D000
heap
page read and write
206E088A000
heap
page read and write
7489BCE000
stack
page read and write
3379000
trusted library allocation
page read and write
20A58A50000
trusted library allocation
page read and write
1902000
heap
page read and write
1985000
heap
page read and write
138A5000
trusted library allocation
page read and write
1890000
heap
page execute and read and write
E41000
heap
page read and write
279FFD40000
heap
page read and write
263F8F9000
stack
page read and write
22A3B695000
heap
page read and write
2B200085000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
830ED7E000
stack
page read and write
1AAD6228000
heap
page read and write
1D52000
unkown
page readonly
1304E7F0000
trusted library section
page read and write
20A58630000
heap
page read and write
1B8FE000
stack
page read and write
5BF3E07000
stack
page read and write
3076000
trusted library allocation
page read and write
1304E7D0000
heap
page read and write
14367000
trusted library allocation
page read and write
14C63355000
heap
page read and write
2EBA000
trusted library allocation
page read and write
AA5A579000
stack
page read and write
3F13000
trusted library allocation
page read and write
13F39000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
206E08C1000
heap
page read and write
1304E800000
trusted library allocation
page read and write
8DEECBE000
stack
page read and write
22002520000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1AAD625F000
heap
page read and write
5BF3F0E000
stack
page read and write
20A5873D000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
201C33AA000
trusted library allocation
page read and write
3EB5000
trusted library allocation
page read and write
1ABD1E40000
heap
page read and write
22A3BAA7000
heap
page execute and read and write
20A586D0000
trusted library allocation
page read and write
22002720000
trusted library allocation
page read and write
BF0000
heap
page read and write
1B691000
heap
page read and write
20A5A620000
heap
page read and write
2E37000
trusted library allocation
page read and write
75FE50E000
stack
page read and write
28CFEFF000
stack
page read and write
1ABD20E4000
trusted library allocation
page read and write
19CADF9000
stack
page read and write
28D05BE000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
6836BF9000
stack
page read and write
14C64CF0000
heap
page read and write
22663B65000
trusted library allocation
page read and write
2645AECD000
direct allocation
page read and write
12F50000
trusted library allocation
page read and write
D10000
heap
page read and write
1B32D000
stack
page read and write
24330115000
heap
page read and write
2FD3000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
1CD0000
unkown
page readonly
1AAD7AE0000
heap
page read and write
131C9000
trusted library allocation
page read and write
216B2F75000
heap
page read and write
1AAD7AD5000
heap
page read and write
E46000
heap
page read and write
201C0BF9000
heap
page read and write
B604FFE000
stack
page read and write
13E33000
trusted library allocation
page read and write
139D6000
trusted library allocation
page read and write
26458566000
heap
page read and write
206E08C1000
heap
page read and write
13DCB000
trusted library allocation
page read and write
3EE7000
trusted library allocation
page read and write
1CB5B31C000
heap
page read and write
B6050FF000
stack
page read and write
2645AE80000
direct allocation
page read and write
C4E71F6000
stack
page read and write
22A39DC4000
heap
page read and write
830E383000
stack
page read and write
201C0B30000
heap
page read and write
30D3000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
AA5A93E000
stack
page read and write
6836C7E000
stack
page read and write
201C0B90000
trusted library allocation
page read and write
E8B000
heap
page read and write
E99000
heap
page read and write
7FFD9B924000
trusted library allocation
page read and write
417267F000
stack
page read and write
1ABD0190000
heap
page readonly
E06853C000
stack
page read and write
13D88000
trusted library allocation
page read and write
13F47000
trusted library allocation
page read and write
1BA4F000
stack
page read and write
1380000
heap
page read and write
304F000
trusted library allocation
page read and write
216B3100000
heap
page read and write
1304E9B0000
heap
page read and write
26407CC000
stack
page read and write
152A3D000
stack
page read and write
1AAD7E50000
trusted library allocation
page read and write
2432E6FB000
heap
page read and write
3BB7000
trusted library allocation
page read and write
13C53000
trusted library allocation
page read and write
13A12000
trusted library allocation
page read and write
F82000
unkown
page readonly
1CB5D310000
heap
page execute and read and write
AC920FE000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
193D000
heap
page read and write
14276000
trusted library allocation
page read and write
22A3B5F0000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
6837E4E000
stack
page read and write
6837BCE000
stack
page read and write
2ED3000
trusted library allocation
page read and write
168D000
heap
page read and write
22E80001000
trusted library allocation
page read and write
22A39DFD000
heap
page read and write
4A5AB7C000
stack
page read and write
B605B4E000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
22663AD0000
heap
page execute and read and write
3ED1000
trusted library allocation
page read and write
1521FF000
stack
page read and write
1520F3000
stack
page read and write
1385000
heap
page read and write
DE62B0C000
stack
page read and write
1913000
heap
page read and write
201C0AF0000
heap
page read and write
13EEE000
trusted library allocation
page read and write
13F61000
trusted library allocation
page read and write
22002560000
heap
page read and write
6BE328C000
stack
page read and write
EFF000
heap
page read and write
74885DE000
stack
page read and write
1AC0000
heap
page read and write
14C65251000
trusted library allocation
page read and write
14C651F0000
trusted library allocation
page read and write
28D110D000
stack
page read and write
E13000
heap
page read and write
226637F0000
trusted library allocation
page read and write
2432E6B0000
heap
page read and write
13B10000
trusted library allocation
page read and write
279FFE19000
heap
page read and write
384F000
trusted library allocation
page read and write
3F19000
trusted library allocation
page read and write
14C65475000
trusted library allocation
page read and write
141A0000
trusted library allocation
page read and write
28D043E000
stack
page read and write
EE2000
stack
page read and write
AC9328E000
stack
page read and write
8DEFB8E000
stack
page read and write
12E2000
stack
page read and write
201C0C0D000
heap
page read and write
1CB5D2E0000
heap
page execute and read and write
13DE9000
trusted library allocation
page read and write
C4E753E000
stack
page read and write
22CDECD9000
heap
page read and write
20A5A631000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1B550000
heap
page read and write
75FD4F9000
stack
page read and write
4172CBC000
stack
page read and write
22CE0660000
trusted library allocation
page read and write
2645853B000
heap
page read and write
22002655000
heap
page read and write
13EF7000
trusted library allocation
page read and write
22CE06F0000
heap
page read and write
22661B06000
heap
page read and write
6837D4C000
stack
page read and write
22CDEC90000
heap
page read and write
1990000
trusted library allocation
page read and write
201C2467000
heap
page execute and read and write
264084C000
stack
page read and write
26458508000
heap
page read and write
1447F000
trusted library allocation
page read and write
243300D0000
trusted library allocation
page read and write
20925FA7000
heap
page read and write
1304F077000
trusted library allocation
page read and write
4172D3E000
stack
page read and write
14C652D5000
trusted library allocation
page read and write
1B540000
heap
page read and write
14C64CF5000
heap
page read and write
1400000
heap
page read and write
13B4F000
trusted library allocation
page read and write
1D02000
unkown
page readonly
19CB139000
stack
page read and write
417378E000
stack
page read and write
4A5A8F6000
stack
page read and write
13DF3000
trusted library allocation
page read and write
1CB5B306000
heap
page read and write
226619C0000
heap
page read and write
144D7085000
heap
page read and write
144D7080000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
E51000
heap
page read and write
15247F000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
7FFD9B78C000
trusted library allocation
page read and write
138D6000
trusted library allocation
page read and write
1ABD2185000
trusted library allocation
page read and write
6BE330E000
stack
page read and write
EF0000
heap
page read and write
216B4ED6000
trusted library allocation
page read and write
AA5B38E000
stack
page read and write
144D6DE0000
heap
page read and write
216B4C20000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
1610000
heap
page read and write
13DEB000
trusted library allocation
page read and write
830F94C000
stack
page read and write
14466000
trusted library allocation
page read and write
2B19000
heap
page read and write
4A5A6FE000
stack
page read and write
22CDECDB000
heap
page read and write
7489ACD000
stack
page read and write
263FAFE000
stack
page read and write
12FD4000
trusted library allocation
page read and write
22A3B5A0000
trusted library section
page read and write
20A5AAF7000
trusted library allocation
page read and write
3550000
unkown
page readonly
22401B00000
heap
page read and write
28D120E000
stack
page read and write
FB7000
unkown
page readonly
20A5A925000
trusted library allocation
page read and write
2B200D6E000
trusted library allocation
page read and write
8DEE5DF000
stack
page read and write
830F9CD000
stack
page read and write
4172353000
stack
page read and write
264584FA000
heap
page read and write
14C64C80000
heap
page readonly
75FDB3B000
stack
page read and write
26458546000
heap
page read and write
748994E000
stack
page read and write
1940000
heap
page read and write
2F58000
trusted library allocation
page read and write
26458558000
heap
page read and write
243300B0000
trusted library allocation
page read and write
B60517B000
stack
page read and write
22401C80000
heap
page read and write
13964000
trusted library allocation
page read and write
1390000
heap
page read and write
5BF31BE000
stack
page read and write
22A39C95000
heap
page read and write
201C29A1000
trusted library allocation
page read and write
220025D0000
heap
page read and write
26458520000
heap
page read and write
AA5A83E000
stack
page read and write
FF5000
heap
page read and write
AC922FD000
stack
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1ABD0088000
heap
page read and write
2432E8D5000
heap
page read and write
2A5E000
stack
page read and write
1AB0000
unkown
page readonly
7FFD9B984000
trusted library allocation
page read and write
1418C000
trusted library allocation
page read and write
13C51000
trusted library allocation
page read and write
22A39D85000
heap
page read and write
18BC000
heap
page read and write
7488A77000
stack
page read and write
139C7000
trusted library allocation
page read and write
1D48000
unkown
page readonly
13C5F000
trusted library allocation
page read and write
75FD8BB000
stack
page read and write
263FBFC000
stack
page read and write
134DC000
trusted library allocation
page read and write
139CB000
trusted library allocation
page read and write
C4E727C000
stack
page read and write
4A5A9FE000
stack
page read and write
13A51000
trusted library allocation
page read and write
209261B0000
heap
page execute and read and write
1351D000
trusted library allocation
page read and write
19CB43B000
stack
page read and write
7FFD9B77C000
trusted library allocation
page read and write
1304EE51000
trusted library allocation
page read and write
1860000
heap
page read and write
1304CEA1000
heap
page read and write
13BA7000
trusted library allocation
page read and write
1360000
heap
page read and write
E8D000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
3E6F000
trusted library allocation
page read and write
206E08B0000
heap
page read and write
EE2000
stack
page read and write
22A3B690000
heap
page read and write
2645856E000
heap
page read and write
7FFD9B933000
trusted library allocation
page read and write
28D02B6000
stack
page read and write
2D3A000
trusted library allocation
page read and write
2645AEC0000
direct allocation
page read and write
7FFD9B788000
trusted library allocation
page read and write
22401BE0000
heap
page read and write
13952000
trusted library allocation
page read and write
13DF1000
trusted library allocation
page read and write
13D8000
heap
page read and write
140A4000
trusted library allocation
page read and write
264586C0000
direct allocation
page read and write
AA59FEF000
unkown
page read and write
13A34000
trusted library allocation
page read and write
1304CE15000
heap
page read and write
216B2FE3000
heap
page read and write
264584F4000
heap
page read and write
BD0000
heap
page read and write
22CE0BA0000
heap
page read and write
4172B3A000
stack
page read and write
16FE000
heap
page read and write
4172A36000
stack
page read and write
2F82000
trusted library allocation
page read and write
14C63430000
heap
page read and write
DE61C37000
stack
page read and write
22A3BAA0000
heap
page execute and read and write
AA5A7BE000
stack
page read and write
140D3000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2A5BBFC000
stack
page read and write
201C0B70000
trusted library allocation
page read and write
22CDECD3000
heap
page read and write
19CB33C000
stack
page read and write
263F283000
stack
page read and write
13A2D000
trusted library allocation
page read and write
97A59FE000
stack
page read and write
22A3BA80000
heap
page execute and read and write
20925BA0000
trusted library allocation
page read and write
E43000
heap
page read and write
34A8000
trusted library allocation
page read and write
830E9F8000
stack
page read and write
209260E0000
heap
page read and write
19CB3BF000
stack
page read and write
1AAD61B0000
heap
page read and write
3580000
unkown
page readonly
1B740000
heap
page execute and read and write
FE2000
stack
page read and write
B60507D000
stack
page read and write
830E6FF000
stack
page read and write
2645AF40000
direct allocation
page read and write
68371FC000
stack
page read and write
209242B8000
heap
page read and write
1ABD003D000
heap
page read and write
AC925BE000
stack
page read and write
C4E7FCE000
stack
page read and write
1304EED6000
trusted library allocation
page read and write
140C000
heap
page read and write
DE61CBA000
stack
page read and write
3552000
unkown
page readonly
4A5AC7B000
stack
page read and write
BB0000
heap
page read and write
1304E830000
heap
page readonly
2432E6EF000
heap
page read and write
152ABE000
stack
page read and write
1AAE000
stack
page read and write
3AA9000
trusted library allocation
page read and write
216B4BF0000
trusted library allocation
page read and write
6836CFB000
stack
page read and write
28D053C000
stack
page read and write
6836AFF000
stack
page read and write
22A39D00000
heap
page read and write
3BF9000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
DE62A89000
stack
page read and write
DE6197A000
stack
page read and write
1CB5B300000
heap
page read and write
26458520000
heap
page read and write
1050000
trusted library allocation
page read and write
201C0BA5000
heap
page read and write
11D5000
heap
page read and write
1AAD6190000
heap
page read and write
1B07D000
stack
page read and write
3082000
trusted library allocation
page read and write
13A8A000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
830ECFC000
stack
page read and write
2645AECB000
direct allocation
page read and write
1411D000
trusted library allocation
page read and write
2645850C000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
20A586E0000
heap
page read and write
1700000
heap
page read and write
3EDF000
trusted library allocation
page read and write
13F9B000
trusted library allocation
page read and write
26458560000
heap
page read and write
DE61DBE000
stack
page read and write
722C10B000
stack
page read and write
1CB5B490000
heap
page read and write
201C0BB0000
heap
page read and write
1304CDE0000
heap
page read and write
3EBF000
trusted library allocation
page read and write
209242EC000
heap
page read and write
201C24C0000
heap
page read and write
1802000
heap
page read and write
4A5A57F000
stack
page read and write
1B94F000
stack
page read and write
13E89000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
28D100E000
stack
page read and write
144D6DE7000
heap
page read and write
75FD5FB000
stack
page read and write
19CA9F3000
stack
page read and write
1ABD004B000
heap
page read and write
19CB03E000
stack
page read and write
201C0BEF000
heap
page read and write
22002500000
heap
page read and write
201C0BF7000
heap
page read and write
264586E0000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
22663780000
trusted library allocation
page read and write
220025D8000
heap
page read and write
3582000
unkown
page readonly
15368C000
stack
page read and write
2645850E000
heap
page read and write
13EB5000
trusted library allocation
page read and write
13DF5000
trusted library allocation
page read and write
1529BE000
stack
page read and write
1AAD7EE0000
trusted library allocation
page read and write
F02000
heap
page read and write
1036000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
AA5A9BB000
stack
page read and write
3D5A000
trusted library allocation
page read and write
209242F2000
heap
page read and write
C4E747D000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
1B96F000
stack
page read and write
D30000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
3620000
heap
page read and write
6BE26BC000
stack
page read and write
32A9000
trusted library allocation
page read and write
140B7000
trusted library allocation
page read and write
97A57F5000
stack
page read and write
2EC2000
trusted library allocation
page read and write
13BA0000
trusted library allocation
page read and write
417398E000
stack
page read and write
143FC000
trusted library allocation
page read and write
13D8C000
trusted library allocation
page read and write
AA5A6BA000
stack
page read and write
26458720000
heap
page read and write
1ABD20D1000
trusted library allocation
page read and write
28CFF7E000
stack
page read and write
1ABD0000000
heap
page read and write
20A5A100000
trusted library allocation
page read and write
683717E000
stack
page read and write
336E000
stack
page read and write
20A58A60000
heap
page readonly
22A39D47000
heap
page read and write
3F3D000
trusted library allocation
page read and write
1B670000
heap
page read and write
220044F4000
trusted library allocation
page read and write
41728FD000
stack
page read and write
13E1C000
trusted library allocation
page read and write
5BF32BC000
stack
page read and write
1ABD0180000
trusted library allocation
page read and write
264584D0000
heap
page read and write
14C65040000
trusted library allocation
page read and write
2645850E000
heap
page read and write
75FE68D000
stack
page read and write
1373B000
trusted library allocation
page read and write
28D01F9000
stack
page read and write
7FFD9B783000
trusted library allocation
page read and write
7FFD9B95C000
trusted library allocation
page read and write
201C24C5000
heap
page read and write
2DAF000
trusted library allocation
page read and write
19D0000
heap
page execute and read and write
2432E660000
heap
page read and write
20A58A70000
heap
page read and write
20A58650000
heap
page read and write
20A587D8000
heap
page read and write
135E2000
trusted library allocation
page read and write
1ABD20D5000
trusted library allocation
page read and write
216B2E80000
heap
page read and write
1ABD20C8000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
6BE308E000
stack
page read and write
DE6298E000
stack
page read and write
2645853D000
heap
page read and write
6836B7E000
stack
page read and write
26458510000
heap
page read and write
12CB1000
trusted library allocation
page read and write
22401C45000
heap
page read and write
1AAD62A4000
heap
page read and write
22A39C90000
heap
page read and write
FD0000
heap
page read and write
15273E000
stack
page read and write
26458519000
heap
page read and write
AC924B8000
stack
page read and write
2432E6F5000
heap
page read and write
216B2F4D000
heap
page read and write
722C5FF000
stack
page read and write
5BF29FE000
unkown
page read and write
22661A6C000
heap
page read and write
22663AB0000
trusted library allocation
page read and write
22401C00000
heap
page read and write
B604C77000
stack
page read and write
FB5000
unkown
page readonly
7FFD9B794000
trusted library allocation
page read and write
5BF2973000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
AC9340C000
stack
page read and write
13BF000
stack
page read and write
216B4CB1000
trusted library allocation
page read and write
13DA7000
trusted library allocation
page read and write
1AAD62A8000
heap
page read and write
1437C000
trusted library allocation
page read and write
2432E690000
heap
page read and write
6BE20FF000
stack
page read and write
263F77E000
stack
page read and write
20924290000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
6BE263E000
stack
page read and write
139C9000
trusted library allocation
page read and write
3542000
unkown
page readonly
1AB2000
unkown
page readonly
216B2EC0000
heap
page read and write
140F000
heap
page read and write
18DD000
heap
page read and write
13174000
trusted library allocation
page read and write
C4E75BC000
stack
page read and write
4173887000
stack
page read and write
E75000
heap
page read and write
1CB5B4C0000
heap
page read and write
E58000
heap
page read and write
13AF6000
trusted library allocation
page read and write
8DEEBB6000
stack
page read and write
2C9F000
stack
page read and write
D50000
heap
page read and write
2432E6B8000
heap
page read and write
2E11000
trusted library allocation
page read and write
206E08C0000
heap
page read and write
6BE320C000
stack
page read and write
263F7F7000
stack
page read and write
14C63427000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
13F3F000
trusted library allocation
page read and write
1285000
heap
page read and write
13CA9000
trusted library allocation
page read and write
3EFB000
trusted library allocation
page read and write
1AAD7AC0000
trusted library allocation
page read and write
13ED9000
trusted library allocation
page read and write
22663740000
trusted library allocation
page read and write
22A39CA0000
heap
page read and write
1AAD7AD0000
heap
page read and write
13D29000
trusted library allocation
page read and write
AA5A637000
stack
page read and write
22CDECCF000
heap
page read and write
134B4000
trusted library allocation
page read and write
B604713000
stack
page read and write
13D9C000
trusted library allocation
page read and write
13746000
trusted library allocation
page read and write
22002790000
heap
page read and write
7488EFE000
stack
page read and write
13D8A000
trusted library allocation
page read and write
1ACD0000
trusted library allocation
page read and write
2B200A0B000
trusted library allocation
page read and write
1304E840000
trusted library allocation
page read and write
24330460000
trusted library allocation
page read and write
12DB0000
trusted library allocation
page read and write
22CDECEB000
heap
page read and write
14334000
trusted library allocation
page read and write
DE61AFD000
stack
page read and write
20A5A4EC000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
13F16000
trusted library allocation
page read and write
2B17000
heap
page read and write
C4E80C9000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
28CFE7F000
unkown
page read and write
201C2450000
heap
page readonly
AC926BD000
stack
page read and write
5BF3036000
stack
page read and write
263FCFB000
stack
page read and write
264584FD000
heap
page read and write
41727FF000
stack
page read and write
1CB5CDD0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
AC927BC000
stack
page read and write
2645AEA0000
direct allocation
page read and write
3ED5000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
830E77E000
stack
page read and write
1ABD00F6000
heap
page read and write
3F31000
trusted library allocation
page read and write
7488B78000
stack
page read and write
220026C3000
heap
page read and write
EB6000
heap
page read and write
DE619FF000
stack
page read and write
13722000
trusted library allocation
page read and write
1340000
heap
page read and write
6BE25BC000
stack
page read and write
226637B0000
trusted library allocation
page read and write
206E0A10000
heap
page read and write
13EAE000
trusted library allocation
page read and write
FB0000
heap
page read and write
1CE2000
unkown
page readonly
1CD2000
unkown
page readonly
140A000
heap
page read and write
14C633B6000
heap
page read and write
B604A7F000
stack
page read and write
1304CF41000
heap
page read and write
3E86000
trusted library allocation
page read and write
3610000
heap
page execute and read and write
279FFDD0000
heap
page read and write
26458568000
heap
page read and write
BE0000
heap
page read and write
14C65130000
heap
page read and write
226619F0000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
1AAD625D000
heap
page read and write
3E63000
trusted library allocation
page read and write
100F000
heap
page read and write
13791000
trusted library allocation
page read and write
2B200D31000
trusted library allocation
page read and write
22E80A0A000
trusted library allocation
page read and write
2EB7000
trusted library allocation
page read and write
20A586E8000
heap
page read and write
4A5A7FD000
stack
page read and write
216B2F31000
heap
page read and write
AA5B44E000
stack
page read and write
5BF2FBE000
stack
page read and write
22A3B5D0000
trusted library allocation
page read and write
22661A4C000
heap
page read and write
26408CE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
13E14000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
22CE0A47000
heap
page read and write
13D0000
trusted library allocation
page read and write
4172DBC000
stack
page read and write
1CB5CC90000
heap
page read and write
5BF2DFE000
stack
page read and write
22A3B5E0000
heap
page readonly
3BCE000
trusted library allocation
page read and write
75FDA3C000
stack
page read and write
216B2EF0000
heap
page read and write
168B000
heap
page read and write
7489A49000
stack
page read and write
138E8000
trusted library allocation
page read and write
75FD57E000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
C4E6BEE000
stack
page read and write
4A5AAFA000
stack
page read and write
14C63220000
heap
page read and write
830F84E000
stack
page read and write
13AFD000
trusted library allocation
page read and write
138CD000
trusted library allocation
page read and write
22004440000
heap
page execute and read and write
1CB5CCD0000
trusted library allocation
page read and write
14500000
trusted library allocation
page read and write
417380E000
stack
page read and write
14C6336D000
heap
page read and write
11E0000
heap
page read and write
C4E8047000
stack
page read and write
AA5B40E000
stack
page read and write
2A5BE7F000
stack
page read and write
AA5A4FE000
stack
page read and write
24330490000
trusted library allocation
page read and write
1B860000
heap
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
3260000
heap
page read and write
2DA1000
trusted library allocation
page read and write
8DEEEBE000
stack
page read and write
19CB0B7000
stack
page read and write
13507000
trusted library allocation
page read and write
830EC7F000
stack
page read and write
26458527000
heap
page read and write
13FAC000
trusted library allocation
page read and write
13EB7000
trusted library allocation
page read and write
1435F000
trusted library allocation
page read and write
3E7B000
trusted library allocation
page read and write
1ABD2040000
heap
page execute and read and write
22A3BD41000
trusted library allocation
page read and write
DE6187F000
stack
page read and write
13FDA000
trusted library allocation
page read and write
1ABCFFC0000
heap
page read and write
1CB5D546000
trusted library allocation
page read and write
264585D0000
heap
page read and write
263F67E000
stack
page read and write
20A58727000
heap
page read and write
22661A10000
heap
page read and write
6BE2337000
stack
page read and write
2200262D000
heap
page read and write
201C0BF3000
heap
page read and write
FC0000
heap
page read and write
1525F9000
stack
page read and write
22A3B620000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
209264D5000
trusted library allocation
page read and write
20A58A75000
heap
page read and write
264584FD000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
22401CAF000
heap
page read and write
1280000
heap
page read and write
13A30000
trusted library allocation
page read and write
C4E737F000
stack
page read and write
F80000
unkown
page readonly
5BF2E7B000
stack
page read and write
26458551000
heap
page read and write
13D0000
heap
page read and write
19E0000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
226638A7000
heap
page execute and read and write
2645855A000
heap
page read and write
3602000
unkown
page readonly
22A3BCC1000
trusted library allocation
page read and write
1454D000
trusted library allocation
page read and write
1304CEE5000
heap
page read and write
201C2A24000
trusted library allocation
page read and write
4172979000
stack
page read and write
20A5A6B6000
trusted library allocation
page read and write
26458525000
heap
page read and write
B604F7E000
stack
page read and write
26458517000
heap
page read and write
5BF2CFF000
stack
page read and write
75FD6F9000
stack
page read and write
1650000
heap
page read and write
2645850E000
heap
page read and write
140E0000
trusted library allocation
page read and write
13A32000
trusted library allocation
page read and write
206E0730000
heap
page read and write
AA5B4C7000
stack
page read and write
22A39D3C000
heap
page read and write
1D1804C6000
trusted library allocation
page read and write
1526F9000
stack
page read and write
226633E0000
heap
page read and write
4A5A1DE000
stack
page read and write
830E7F9000
stack
page read and write
7FFD9B987000
trusted library allocation
page read and write
13C02000
trusted library allocation
page read and write
1436000
heap
page read and write
6BE3189000
stack
page read and write
152839000
stack
page read and write
28D118C000
stack
page read and write
28D04BE000
stack
page read and write
75FD838000
stack
page read and write
1CB5B2FC000
heap
page read and write
E0689FE000
stack
page read and write
2432E8A0000
heap
page read and write
2645850A000
heap
page read and write
264586A0000
direct allocation
page read and write
20A587D5000
heap
page read and write
EB8000
heap
page read and write
14412000
trusted library allocation
page read and write
C4E81CE000
stack
page read and write
748859F000
unkown
page read and write
1304CE20000
heap
page read and write
7FFD9B98D000
trusted library allocation
page read and write
201C2BC5000
trusted library allocation
page read and write
22A39B80000
heap
page read and write
C4E6E7F000
stack
page read and write
13CD5000
trusted library allocation
page read and write
AA59F63000
stack
page read and write
DE61543000
stack
page read and write
B604AFF000
stack
page read and write
1B11F000
stack
page read and write
2645856C000
heap
page read and write
22401C8A000
heap
page read and write
20924394000
heap
page read and write
20A5A190000
heap
page read and write
13B9E000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
2266390D000
heap
page read and write
4172C3E000
stack
page read and write
22A39D43000
heap
page read and write
22CDECD7000
heap
page read and write
1403D000
trusted library allocation
page read and write
201C0C35000
heap
page read and write
35E2000
unkown
page readonly
AC92179000
stack
page read and write
6836EFB000
stack
page read and write
329E000
stack
page read and write
C4E6EFE000
stack
page read and write
12DB1000
trusted library allocation
page read and write
13A09000
trusted library allocation
page read and write
22661A5A000
heap
page read and write
11CF000
stack
page read and write
201C0AD0000
heap
page read and write
216B3105000
heap
page read and write
C4E6F79000
stack
page read and write
13E09000
trusted library allocation
page read and write
26458554000
heap
page read and write
722C4FF000
unkown
page read and write
1202000
heap
page read and write
2ED6000
trusted library allocation
page read and write
22A3BCB0000
heap
page execute and read and write
22A39C60000
heap
page read and write
7488C79000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
20924335000
heap
page read and write
139BB000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1D180227000
trusted library allocation
page read and write
19CAF7D000
stack
page read and write
1335000
heap
page read and write
2645850A000
heap
page read and write
22A3B660000
trusted library allocation
page read and write
22CE0DD6000
trusted library allocation
page read and write
6BE1EFF000
unkown
page read and write
830E8F9000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B916000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
263F9F8000
stack
page read and write
14033000
trusted library allocation
page read and write
1D64000
unkown
page readonly
B605DCE000
stack
page read and write
279FFE10000
heap
page read and write
2A5BEFF000
stack
page read and write
24330691000
trusted library allocation
page read and write
131D1000
trusted library allocation
page read and write
AC9318E000
stack
page read and write
279FFC60000
heap
page read and write
24330080000
trusted library section
page read and write
3F23000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
14C63300000
heap
page read and write
F80000
heap
page read and write
28D00F7000
stack
page read and write
22004695000
trusted library allocation
page read and write
264586A3000
direct allocation
page read and write
C4E707B000
stack
page read and write
22002658000
heap
page read and write
1304CDD0000
heap
page read and write
263F38F000
stack
page read and write
4172779000
stack
page read and write
7488513000
stack
page read and write
4A5A77B000
stack
page read and write
226633B0000
heap
page read and write
13D1B000
trusted library allocation
page read and write
19CB1B8000
stack
page read and write
13D3B000
trusted library allocation
page read and write
1304ED0C000
heap
page read and write
201C09F0000
heap
page read and write
201C2470000
trusted library allocation
page read and write
1441000
heap
page read and write
4A5A679000
stack
page read and write
13FC3000
trusted library allocation
page read and write
AC9320E000
stack
page read and write
11880227000
trusted library allocation
page read and write
24330560000
heap
page read and write
140C1000
trusted library allocation
page read and write
216B30E0000
heap
page read and write
13B0000
heap
page read and write
13B7F000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
13C21000
trusted library allocation
page read and write
AC92279000
stack
page read and write
DE61FBB000
stack
page read and write
13AE2000
trusted library allocation
page read and write
2B80000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
13889000
trusted library allocation
page read and write
13A1F000
trusted library allocation
page read and write
1CB5B2DD000
heap
page read and write
B605CCD000
stack
page read and write
22CE0C35000
trusted library allocation
page read and write
1B7D0000
heap
page execute and read and write
7FFD9B926000
trusted library allocation
page read and write
35F0000
heap
page read and write
201C2990000
heap
page read and write
16B6000
heap
page read and write
DD0000
heap
page execute and read and write
13EB7000
trusted library allocation
page read and write
75FD16F000
unkown
page read and write
20924240000
heap
page read and write
22A3B5B0000
trusted library allocation
page read and write
13F21000
trusted library allocation
page read and write
19CAD7E000
stack
page read and write
DB0000
trusted library allocation
page read and write
683707E000
stack
page read and write
206E08B0000
heap
page read and write
1D180086000
trusted library allocation
page read and write
1CB5CD90000
trusted library allocation
page read and write
6837DCC000
stack
page read and write
7FFD9B993000
trusted library allocation
page read and write
36EA000
trusted library allocation
page read and write
1404A000
trusted library allocation
page read and write
1929000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
22661A18000
heap
page read and write
1AAD6269000
heap
page read and write
E00000
heap
page read and write
209242B0000
heap
page read and write
1CF0000
unkown
page readonly
1200000
heap
page read and write
1CB5D6CF000
trusted library allocation
page read and write
75FD67E000
stack
page read and write
1304CE50000
trusted library section
page read and write
3629000
heap
page read and write
4172AB8000
stack
page read and write
19E5000
heap
page read and write
2ECE000
trusted library allocation
page read and write
1ABD0041000
heap
page read and write
206E08C5000
heap
page read and write
E22000
heap
page read and write
B72000
stack
page read and write
6836DF9000
stack
page read and write
7FFD9B938000
trusted library allocation
page read and write
1304E870000
trusted library allocation
page read and write
8DEE8F9000
stack
page read and write
830F8C7000
stack
page read and write
7FFD9B964000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page read and write
209262C2000
trusted library allocation
page read and write
19CB2BE000
stack
page read and write
1AAD6205000
heap
page read and write
19CAC7F000
unkown
page read and write
14C65070000
trusted library allocation
page read and write
1CB5D3A5000
trusted library allocation
page read and write
18B0000
heap
page read and write
1304E8B7000
heap
page execute and read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
22A3BAD0000
heap
page read and write
14C63377000
heap
page read and write
AA5A479000
stack
page read and write
201C0B50000
trusted library section
page read and write
3F0F000
trusted library allocation
page read and write
19CACFF000
stack
page read and write
22CDEC98000
heap
page read and write
830FA4E000
stack
page read and write
201C0B60000
trusted library section
page read and write
7488AFD000
stack
page read and write
22CE0630000
trusted library allocation
page read and write
26458525000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
DE61A77000
stack
page read and write
1B702000
heap
page execute and read and write
20A5A5F0000
heap
page execute and read and write
AC9253A000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
13DAA000
trusted library allocation
page read and write
22CDEBF0000
heap
page read and write
1ABD2051000
trusted library allocation
page read and write
1B9FE000
stack
page read and write
13910000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
22A39CD0000
heap
page read and write
22E80084000
trusted library allocation
page read and write
417390C000
stack
page read and write
13DEE000
trusted library allocation
page read and write
13C8D000
trusted library allocation
page read and write
FC2000
unkown
page readonly
1920000
heap
page read and write
13CEB000
trusted library allocation
page read and write
13864000
trusted library allocation
page read and write
26458558000
heap
page read and write
141C6000
trusted library allocation
page read and write
14004000
trusted library allocation
page read and write
1304E930000
heap
page read and write
1ABD2108000
trusted library allocation
page read and write
28D03B9000
stack
page read and write
1720000
heap
page read and write
68367A3000
stack
page read and write
C4E7178000
stack
page read and write
2B200001000
trusted library allocation
page read and write
14012000
trusted library allocation
page read and write
1CB5CD00000
heap
page readonly
139CD000
trusted library allocation
page read and write
13937000
trusted library allocation
page read and write
206E08B0000
heap
page read and write
2BF0000
heap
page execute and read and write
206E0810000
heap
page read and write
26458551000
heap
page read and write
ED9000
heap
page read and write
20924275000
heap
page read and write
13D7E000
trusted library allocation
page read and write
141E1000
trusted library allocation
page read and write
209242F0000
heap
page read and write
3E37000
trusted library allocation
page read and write
1AAD83E6000
trusted library allocation
page read and write
2645851C000
heap
page read and write
B604CFD000
stack
page read and write
2645856E000
heap
page read and write
6BE2279000
stack
page read and write
1BAFF000
stack
page read and write
19CC00E000
stack
page read and write
E20000
heap
page read and write
216B3080000
heap
page execute and read and write
20926190000
heap
page execute and read and write
DE62A0E000
stack
page read and write
20A5872D000
heap
page read and write
1CB5D128000
heap
page read and write
1CB5CD50000
heap
page read and write
4172BBE000
stack
page read and write
1AAD7F26000
heap
page read and write
1420F000
trusted library allocation
page read and write
1445000
heap
page read and write
263F3CE000
stack
page read and write
13A71000
trusted library allocation
page read and write
13AC2000
trusted library allocation
page read and write
B60479F000
unkown
page read and write
26458660000
direct allocation
page read and write
13E89000
trusted library allocation
page read and write
13D20000
trusted library allocation
page read and write
3240000
heap
page read and write
22663760000
trusted library allocation
page read and write
14C65B1F000
trusted library allocation
page read and write
216B4D34000
trusted library allocation
page read and write
1CB5CDD5000
heap
page read and write
1AAD8146000
trusted library allocation
page read and write
264074B000
stack
page read and write
13C39000
trusted library allocation
page read and write
74889FF000
stack
page read and write
201C0BED000
heap
page read and write
74888FE000
stack
page read and write
1B21D000
stack
page read and write
12E80000
trusted library allocation
page read and write
20924100000
heap
page read and write
3E79000
trusted library allocation
page read and write
22CE0B60000
heap
page execute and read and write
11BF000
stack
page read and write
13946000
trusted library allocation
page read and write
830EBFE000
stack
page read and write
10A0000
heap
page read and write
F80000
unkown
page readonly
13C25000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
12C07000
trusted library allocation
page read and write
97A5BFE000
stack
page read and write
1438000
heap
page read and write
3739000
trusted library allocation
page read and write
144D6DEA000
heap
page read and write
24330110000
heap
page read and write
7FFD9B928000
trusted library allocation
page read and write
AC923BE000
stack
page read and write
AC91DCF000
unkown
page read and write
830E87E000
stack
page read and write
75FD1EF000
stack
page read and write
41726FE000
stack
page read and write
7FFD9B93C000
trusted library allocation
page read and write
3EFD000
trusted library allocation
page read and write
1343C000
trusted library allocation
page read and write
12E50000
trusted library allocation
page read and write
1304E820000
trusted library allocation
page read and write
10B0000
heap
page read and write
13868000
trusted library allocation
page read and write
131CE000
trusted library allocation
page read and write
13F9F000
trusted library allocation
page read and write
22002760000
trusted library allocation
page read and write
1BCFE000
stack
page read and write
B605C4C000
stack
page read and write
14C63375000
heap
page read and write
2645AF43000
direct allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
75FD0E3000
stack
page read and write
2645852C000
heap
page read and write
830E3CE000
stack
page read and write
19CAFF9000
stack
page read and write
AC921FE000
stack
page read and write
7FFD9B927000
trusted library allocation
page read and write
14417000
trusted library allocation
page read and write
1ABD0045000
heap
page read and write
AC9207F000
stack
page read and write
13731000
trusted library allocation
page read and write
1528BE000
stack
page read and write
226633E5000
heap
page read and write
140C0000
trusted library allocation
page read and write
1ABD1F70000
heap
page execute and read and write
13074000
trusted library allocation
page read and write
11CF000
stack
page read and write
B605D4C000
stack
page read and write
B604DF6000
stack
page read and write
1527B7000
stack
page read and write
14C63371000
heap
page read and write
220025A0000
trusted library allocation
page read and write
13AF4000
trusted library allocation
page read and write
13520000
trusted library allocation
page read and write
14B8000
heap
page read and write
1008000
heap
page read and write
142D000
heap
page read and write
1AAD80B0000
heap
page execute and read and write
307C000
trusted library allocation
page read and write
BD0000
heap
page read and write
14C63495000
heap
page read and write
5BF33BB000
stack
page read and write
13F0000
trusted library allocation
page read and write
1ABD01A0000
trusted library allocation
page read and write
19CBE8E000
stack
page read and write
140F5000
trusted library allocation
page read and write
1304CE9D000
heap
page read and write
14C64C70000
trusted library allocation
page read and write
13DD8000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
3EF3000
trusted library allocation
page read and write
3839000
trusted library allocation
page read and write
830F7CE000
stack
page read and write
5BF30B8000
stack
page read and write
20924280000
trusted library section
page read and write
75FD9BF000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1304CEAB000
heap
page read and write
2432E8D0000
heap
page read and write
201C0BFB000
heap
page read and write
13E6F000
trusted library allocation
page read and write
22CDEC40000
heap
page read and write
144ED000
trusted library allocation
page read and write
1AAD82E6000
trusted library allocation
page read and write
1ABD1FC0000
trusted library allocation
page read and write
1710000
heap
page execute and read and write
20A58690000
heap
page read and write
28D007E000
stack
page read and write
41723DF000
unkown
page read and write
140A5000
trusted library allocation
page read and write
1CB5B346000
heap
page read and write
26458554000
heap
page read and write
22002615000
heap
page read and write
1434000
heap
page read and write
209262A0000
heap
page execute and read and write
22CDED16000
heap
page read and write
209242FC000
heap
page read and write
13C39000
trusted library allocation
page read and write
220026C7000
heap
page read and write
3600000
unkown
page readonly
7488CFA000
stack
page read and write
1380000
heap
page read and write
2645854D000
heap
page read and write
1C010000
heap
page read and write
22CE0610000
trusted library allocation
page read and write
206E08C0000
heap
page read and write
13AFF000
trusted library allocation
page read and write
14C64C50000
trusted library allocation
page read and write
7488979000
stack
page read and write
EB6000
heap
page read and write
28D023E000
stack
page read and write
13E7F000
trusted library allocation
page read and write
144B1000
trusted library allocation
page read and write
216B30E5000
heap
page read and write
1304CF55000
heap
page read and write
1CF2000
unkown
page readonly
4A5B8CE000
stack
page read and write
1304CE60000
heap
page read and write
830E67E000
unkown
page read and write
206E0830000
heap
page read and write
There are 1772 hidden memdumps, click here to show them.